Significant Data Breaches – August 2015

Significant Data Breaches – August 2015

It looks like even hackers take vacations. The month of August only had one significant data breach. Carphone Warehouse – $2.4M exposed…

Significant Data Breaches – July 2015

Significant Data Breaches – July 2015

IKANOW’s major breach index along with a recap of the major data breaches that took place in July 2015 are listed below.…

Finding Useful Information in Your SIEM Alerts

Finding Useful Information in Your SIEM Alerts

For many companies, the “boy who cried wolf” isn’t a fable. A constant stream of security alerts generated by security information and…

IKANOW’s Major New InfoSec Analytics Release

IKANOW’s Major New InfoSec Analytics Release

We are thrilled to announce today the release of the next version of our Enterprise Edition Information Security Analytics (ISA) platform. This new…

Webinar Recording: Continuous cybersecurity optimization and prioritized risk reduction. What it takes.

Webinar Recording: Continuous cybersecurity optimization and prioritized risk reduction. What it takes.

On July 9th, IKANOW hosted a webinar titled: “Continuous cybersecurity optimization and prioritized risk reduction. What it takes.” The presenters were Jason…

SIGNIFICANT DATA BREACHES – June 2015

SIGNIFICANT DATA BREACHES – June 2015

IKANOW’s major breach index along with a recap of the major data breaches that took place in June 2015 are listed below. Japan’s…

Significant Data Breaches – May 2015

Significant Data Breaches – May 2015

IKANOW’s major breach index along with a recap of the major data breaches that took place in May 2015 are listed below. mSpy…

CISOs Expanding Portfolio to Include Corporate Risk Management

CISOs Expanding Portfolio to Include Corporate Risk Management

CISOs who fret that corporate boards don’t pay enough attention to information security can take comfort in a trend that has CISOs…

ANALYTICS-ENHANCED THREAT INTEL: MAKING FEEDS WORK FOR YOU – PART 3

ANALYTICS-ENHANCED THREAT INTEL: MAKING FEEDS WORK FOR YOU – PART 3

This is part 3 of our blog series, “Are your threat intelligence feeds saving you, or costing you?”. Part 1 covered gathering…

Analytics-Enhanced Threat Intel: Making Feeds Work For You – Part 2

Analytics-Enhanced Threat Intel: Making Feeds Work For You – Part 2

This is Part 2 of our blog series, “Analytics-Enhanced Threat Intel: Making Feeds Work For You.” Part 1 focused on gathering threat…

123